Computer Security Coordinator Job Description Sample
Computer Security Engineer, Government Background Check Required
General Dynamics IT has an opening for a Junior Network Security Analyst in New Orleans, LA.
Successful candidate must be able to pass a government background investigation. Candidates must be authorized to work in the US and a resident of the US for the previous 3 years with no longer than a 90 day absence.
Seeking a motivated and energetic Junior Network Security Analyst to join our superb team of software professionals. We want a dedicated individual who wants to lead our security efforts and work closely with our computer operations team to implement innovative IT solutions for our customer.
Participate in planning, monitoring, auditing, reviewing, and executing information security and privacy activities to ensure the safety of information systems. You will assist with investigating and analyzing risks to help determine remediation solutions and best practices for penetration testing. Track the compliance of information systems, to ensure standards are being met. Engage in continuous training for current Network Security Tools and new technologies. Responding to information security-related questions and inquiries will be part of your role, coordinating with System Administrators and assisting in educating our team on information security tools, policies and procedures. Properly document and track all technical tasks and report to team lead as required.
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Coordinate with System Administrators regarding patching of applications and operating systems
Assists with implementation of counter-measures or mitigating controls
Performs Computer Security Incident Response activities and, coordinates with Team Lead to record and report incidents
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and Web integrity scans to determine compliance
Research and Education on Current Threats and Detection Methodologies
Maintains current knowledge of relevant technology as assigned
Participates in special projects as required
Bachelors Degree in a Computer Science or related technical discipline, or the equivalent combination of education, technical certifications or training, or work/military experience.
5-8 years of directly related computer systems analysis and/or programming experience.
Required Specialized Skills:
Understanding of Windows Enterprise AD architecture
General knowledge of network protocols, enterprise architecture, and network security systems and products
Solid writing skills to support technical user guide documentation, standard operating procedures, and response playbooks
Ability to support developing and conducting detailed, technical, and hands on training
Demonstrated analytical and communications skills
Desired Skills, Qualifications or Experience:
Certification(s) Desired: Certified Ethical Hacker, Security+, or equivalent or must be able to obtain within 6 months of hiring
Security Tool Experience (Tripwire CCM, Symantec SEP, IBM IEM, Nessus Security Center)
General knowledge or experience with Linux Operating Systems
Penetration Testing or Ethical Hacking
Technical expertise that provides ability to deploy and maintain open source network security monitoring and assessment tools
Execute remediation process to implement technical solutions to address vulnerability findings
Knowledge of data security administration principles, methods, and techniques
System administration experience
Network engineering experience
Position requires a government background investigation.
Candidates must be authorized to work in the US and a resident of the US for the previous 3 years with no longer than a 90 day absence.
For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Senior Computer Security System Specialist
Graham Technologies is hiring a Senior Computer Security System Specialist at our customer site in Honolulu, Hawaii. We are looking for a candidate that will performing the functions and responsibilities of securing equipment, materials, and information.
- Maintain up-to-date records of COMSEC inventory and submit required accounting reports IAW policies and procedures.
- Administer initial briefings and debriefings to individual users; maintain copies of all.
- Programming and local distribution of COMSEC devices
- Order, receipt, loading and management of COMSEC keying material using devices such as the Key Management Infrastructure (KMI) and Simple Key Loader (SKL) and other devices as necessary.
- Evaluate new COMSEC equipment and fax machines
- Maintain a stock of COMSEC equipment to provide immediate replacement of operational equipment for use in establishing emergency circuits and to replace equipment in need of repair.
- Update and maintain the SOPs for COMSEC activities.
- Re-key all circuits as required.
- Assist in properly storing, managing, and maintaining accountability within KMI on all COMSEC material and assets.
- Ensure prompt and accurate preparation, signature, and submission of account correspondence, message, and accounting reports.
- Conduct periodic spot checks to ensure clearances listed are actually held and valid.
- Develop and conduct COMSEC training and materials.
To land this job you will have to have an active Secret.
- At least 2 yrs. experience as a COMSEC Manager. Must have direct hands on experience with the requirements detailed with in NSA CSS Policy Manual 3.16 and KMI 5110 Version 1 Dated May 2017.
- Must have a strong background in C4I System and Networks and shall be experienced in theory of all aspects of COMSEC equipment and System to include Secure Communications Internet Protocol (SCIP devices, Secure Analog and Data Service devices, SECTERA Wireline Terminal (SWT), Secure Telephone Equipment (STE) and SECTERA VIPER Phone.
- Shall be able to clearly articulate COMSEC concerns, including recommended Courses of Actions both verbally and writing, to U.S. and Host Nations senior leadership.
- Required to complete KMI operations training provided by NSA/DoD Service sponsored agency.
- Contractors will register and arrange to attend the COMSEC Managers Course training within three months of contract start.
- CAP, GSLC, Security +CE Certified
We’ll pay you a competitive salary commensurate to your experience. Graham Technologies benefits package includes comprehensive health and dental care, life insurance and AD&D, 401(k), up to 27 days of paid time off per year, 10 holidays per year, short and long term disability, education/training assistance, referral program and transportation benefits. We also believe in work to life balance and treating our employees as part of the Graham Tech family. We are looking for employees who want to grow in their career and with our company.
About Graham Technologies
Established in 2007, Graham Technologies provides Information Technology (IT) and engineering support services to the commercial and federal sectors. Through Superior IT support services and application modernization, Graham has assisted customers in achieving their respective goals and objectives; increasing their return on investment (ROI); and maintaining efficiency and effectiveness of their IT solutions. Graham Technologies is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.
Are you willing to accept the mission?
Sounds interesting? Start the conversation. Tell us what the next step in your career could be.
FSG Computer Sys Security Anlyst 3
External Job Description
The Technical Solutions division of Huntington Ingalls Industries is looking for a Cyber Security Specialist in Huntsville, AL.
This position will provide cyber security support for the division IT infrastructure, which services over 5,500 employees across the US and internationally.
- The selected candidate will be required to obtain/maintain a SECRET level security clearance.
Responsibilities of this position include: Reporting IT security incidents (including computer viruses) in accordance with established procedures; Vulnerability Management; Assist in Conducting Compliance Testing; Support Cybersecurity activities including, risk assessments, and decision support activities. Monitor and analyze network traffic and IDS alerts; Intrusion detection and investigation; Analyze a variety of host-based and network logs; Incident triage and reporting.
Successful candidate will have the ability to understand IDS signatures.
Candidate must have experience in the areas of vulnerability scanning, assessment and analysis (including NESSUS, Open VAS, IDA Pro, Encase).
Candidate must have cyber security risk assessment and decision support activities experience; must have scripting skills to include but not limited to PERL, Python, shell scripting.
Candidate should be a highly motivated individual with the ability to self-start, prioritize, multi-task and work in a team setting.
IT certifications such as CompTIA's Security+ and Certified Ethical Hacker (CEH) are highly desired.
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. May prepare security reports to regulatory agencies.
Job performance requires adequate visual acuity and manual dexterity for meeting the requirements of a Systems Analyst discipline. Office work environment normally encountered.
5 Years relevant experience with Bachelors; 3 Years relevant experience with Masters; An additional 4 years of specific job experience with a HS diploma may be substituted for the Bachelor's degree requirement for this job. This experience is in addition to the relevant years of experience listed with the job's education requirements. Example: If this job required a Bachelor's degree + 5 years relevant experience the equivalency would equal HS diploma + 9 years job related experience.
Computer Security Incident Response Team (Csirt) Manager
Security: Computer Security Incident Response Team (CSIRT) Manager
We are looking for an experienced Incident Response Manager to lead and manage our incident response team and help protect the company. As Incident Response Manager, you will work with engineering teams to lead large-scale, cross-functional projects throughout the organization as well as manage incident and threat response efforts. You will be managing two sub-teams:
- CSIRT Engineering create new and effective tools to further the mission of our security team and Airbnb. In the last two years, CSIRT:Engineering has built and open sourced several detection tools based on cutting-edge AWS serverless offerings including AWS Lambda, Kinesis, SQS, and more. This includes StreamAlert, a real-time data analysis framework, and BinaryAlert, a real-time malware detection engine.
For more details, see our Job Description for CSIRT Engineers here.
- Threat Intelligence and Response puts heavy emphasis on automation and high-fidelity rules with enough context to be triaged via a mobile application. They work on translating raw intelligence from public and commercial threat reports into actionable detection rules that focus on TTPs. They utilize MITRE's ATT&CK framework to reason about breadth, depth and areas for improvement. They carefully reason about what they are uniquely positioned to do and where they can leverage industry partners and vendors.
The team puts heavy emphasis on automation and high-fidelity rules with enough context to be triaged via a mobile application.
For more details, see our Job Description for Threat Intelligence and Response engineers here.
People Development: You have multiple years of experience in people management. You are an effective career coach and can provide mentorship and feedback. You enjoy investing in your teammates and developing career progression plans with them, helping them reach their highest potential.
Team Development: You are an effective leader that focuses on efficiency and delivering on expectations. You play an active role in identifying and recruiting junior and senior candidates. You understand when to get your hands dirty and contribute and when to delegate and grow your teammates.
Technical Leadership: You have experience in developing and communicating strategies that team(s) execute on. You don't wait for things to happen to you, you make things happen. You have multiple years of experience in detecting and responding to attacks. You can quickly discern between false positives, true positives, broad crimeware attacks, APT attacks, and know the most effective ways of dealing with the swaths of risks and threats that face a business. Since this is a small team, you're capable of strong individual contributions.
Influence & Communication: You have strong written and verbal communication skills. You can dive into the details with engineers but also speak at the appropriate altitude when working with other organizations and leaders. You have empathy and seek to understand when communicating. This enables you to effectively identify the best path forward and influence how you approach a problem, as well as how other teams may prioritize supporting your work.
Areas of future and continued investment:
Data science, analytics, machine learning
Host, container, and network instrumentation
Big Data, ETL, AWS Athena
Serverless Technologies including AWS Lambda and AWS Kinesis
The following are skills and experiences that are relevant to us:
- Experience with AWS (Lambda, Kinesis, S3, SNS, SQS, EC2, ...)
- Experience in Software development (Python, Ruby, Golang, Java, C/C++, …)
- Familiar with version control (Git / Mercurial / SVN)
- Familiar with Logging infrastructure (Syslog, Fluentd, Logstash)
- A desire to dive into Big Data, Data Science, Analytics, Machine Learning
Quarterly employee travel coupon
Paid time off
Medical, dental, & vision insurance
Life insurance and disability benefits
Flexible Spending Accounts
Community involvement (4 hours per month to give back to the community)
Company sponsored tech talks and happy hours
Breakfast, lunch, and dinner
Computer Security Forensic Investigator-Ts/Sci Level Clearance Required-Springfield, VA
Leidos has a current opening for a Computer Security & Forensic Investigator-Case Control Officer at our Customer site in Springfield, VA An ACTIVE TS/SCI level security clearance is required to be considered.
Overall Assignment Description:
Case Control Officers: receive, vet, evaluate, de-conflict, refer, and track insider threat, workplace violence, crisis, and other incidents; conduct inquiries into insider threat and other events; provide written reports or referrals to other investigative offices or entities; and perform other duties as assigned.
Duties may include:
Support the GPOC (i.e. C/SIIC) and team members assigned to SIIC, including those in the Case Control and Threat Management Branch, the Investigations Branch, and the Digital Forensics Branch
Intake, evaluate, vet, and refer incoming insider threat, workplace violence and crisis (WV&C), and related complaints and referrals for possible inquiry or investigation
Respond to Insider threat complaints and referrals
Assist the Threat Management Team in responding to WV&C complaints and referrals, when needed
Conduct investigative-sufficient inquiries and investigations into insider threat, WV&C, and related incidents
Operate the SII Case Management System (CMS), and provide cradle-to-grave tracking, de-confliction, coordination, disposition, and case closure for all insider threat, WV&C, and related complaints, referrals, inquiries, and investigations within the Agency
Operate the Customer's Insider Threat Hotline
Generate timely and accurate memorandums and/or reports on metrics, system usage, complaint evaluations, reports of inquiry or investigation, and other reports as required
Brief Branch Chiefs, C/SIIC, SII management, and other Customer officials on inquiries, investigations, and special projects, as needed
Regularly participate in: NGA Insider Threat Case Control Working Group (ITCCWG) meetings; at least one session per quarter of Agency-level insider threat, CI, LE or security-related working groups; and at least two sessions per year of national-level Insider threat, CI, LE or security-re-lated working groups
Identify gaps in the program, processes, and capabilities; recommend solutions to address those gaps
Work closely with administrative and investigative partners, other Divisions, and other personnel assigned to accomplish the Customer's mission
Perform other related duties as assigned by the GPOC
Required Skills and Experience:
Bachelor's degree w/ minimum 7 yrs of related professional experience in counterintelligence, criminal, fraud, administrative, computer forensics, criminal justice, technical (i.e. engineering), information technology, or similar fields
A minimum of five (5) years' experience in the Intelligence Community, focused on detecting, recognizing, coordinating, and investigating (administrative, criminal, counterintelligence, personnel security, etc.) foreign threats, insider threats, criminal activities, workplace violence, crises, personnel security issues, and/or similar matters
Experience with investigative or analytical databases and tools (e.g. Federal agency law enforcement, CI, background investigation, badging, personnel, administrative, etc.)
Demonstrated experience developing and delivering professional-level reports, memorandums, information, briefings, and/or recommendations that support inquiries and investigations of insider threats, workplace violence, crisis incidents, CI, and/or LE matters; and successful implementation of Government security requirements
Graduation from agent, investigator or police certification programs delivered by the Federal Law Enforcement Training Academy/Center (FLETA/FLETC), Joint Counterintelligence Training Academy (JCITA), or other Federal or State equivalents
Experience in successfully coordinating investigations or inquiries across Federal and/or State agencies
Experience in successfully conducting law enforcement, CI or cyber intelligence analysis
Experience in successfully conducting computer forensic analysis after successfully obtaining a Federal-level certification in that field
"External Referral Eligible"
Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 31,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10.17 billion for the fiscal year ended December 29, 2017. (NYSE: LDOS) All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.
Technology Coordinator III (Oep - Computer Education)
CLASS TITLE: Technology Coordinator III
CHARACTERISTICS OF THE CLASS: Under the supervision of the school principal or his/her designee, coordinates computer technology functions at a local school, including installation, troubleshooting, maintenance, and technical support, and performs related duties as required.
EXAMPLES OF DUTIES: Duties of this position include, but are not limited to:
- Network and LAN Maintenance:
Coordinates integration of the LAN (Local Area Network) with CPS WAN (Wide Area Network)
Manages Proxy, Web, Video, E-mail, etc., servers
Installs and maintains network software
Manages internet filtering
Creates user and assign rights
Establishes and monitors storage management
Implements and manages backup network
Utilizes disaster recovery skills
Develops written documentation of all LAN operations/functions
Implements and manages network security scheme
Troubleshoots LAN Equipment
Identifies and documents problems and contacts appropriate resources to resolve issues
Troubleshoots Equipment, including, but not limited to, printers, computers, peripherals
Resolves software conflicts and other related issues
Develops maintenance schedule
Manages warrantee service
Sets up and manages databases
- Technical Support and Training:
Establishes a training program for teachers based on a needs assessment provided by the Office of Technology Services
Provides personalized training and support in software applications, e-mail, internet basics and other applications
Conducts in-service training for teachers on LAN usage, maintaining classroom equipment, and software
Schedules and conducts in-services and workshops for teachers in software applications and basic troubleshooting
Trains teachers to be print managers
- Other Duties:
Maintains supply inventory
Monitors software and software licenses
Maintains equipment inventory
Meets regularly with school technology team
Orders related supplies
Stays current with trends in technology
Training and Experience. Must possess a Bachelor's degree from an accredited college or university, supplemented by at least one year of experience in network maintenance and administration. Experience in installation of basic computer hardware components is required.
Knowledge, Abilities, and Skill. Skills in providing technical support and training are highly desirable.
Good oral and written communication skills. Evening and weekend work may be required.
Physical Requirements. Medium Work: Exerting twenty (20) to fifty (50) pounds of force occasionally, or ten (10) to fifteen (15) pounds of force frequently, or greater than negligible up to ten (10) pounds of force constantly to move objects.
Computer Security Engineer Intern
Opportunity: Are you a computer security engineer interested in design, analysis, development, configuration, testing, training and securitization of software and computer systems? Do you want to solve challenging technical problems and provide creative solutions to meet mission needs?
We are focused on providing our customers expertise in the areas of computer security, information technology, information assurance and computer networking expertise and to create new capabilities. This project provides a unique opportunity to be involved in quick-reaction tasks with opportunities for travel and customer interaction on a team that is focused on developing superior products and encouraging the career growth of its members.
Enrolled in a Bachelor of Science in Computer Security, Information Technology and Forensics; Computer Engineering, Computer Science or related field
Must have a GPA 3.0 or above (out of 4.0 scale)
0-4 years of Computer Security experience
Proof of US citizenship is required
Applicants selected for employment will be subject to a Federal background investigation and must meet additional eligibility requirements for access to classified information or materials
Experience working in a Linux command line environment
Network Device Configuration Experience with Managed Switches, Routers and Routing protocols; and network peripherals
Working knowledge of Network protocols including http, ftp, ssh, tcp, udp, ip, arp, Ethernet, and 802.11 technologies
Experience configuring and administering Backup, Email, Voip, HTTP, and Chat services
Experience loading and updating Linux, Windows operating systems on computer hardware or virtualized platforms
Working knowledge of Computer/Network Security and Forensics best practices
Cisco IOS Experience with CCNA/CCNP
Experience setting up software and hardware required for Virtualization technologies (VMWare, Xen, OpenStack, VirtualBox)
Working knowledge of Wireshark, wget, netcat, iperf, metasploit, nmap, and Ida Pro applications
Working knowledge in penetration testing, intrusion detection systems, firewall configurations, access control lists, and iptables
Experience in python, ruby, bash, and perl scripting
Experience analyzing performance issues and implementing efficiency improvements
Experience with any of the following technologies a plus:
Experience with Windows XP/7/8/Server, and MacOS
Knowledge of VxWorks, Linux, or other Embedded Systems
Experience performing unit testing
Experience in C, C++, java, web programming
Software design pattern knowledge and object-oriented analysis and design (OOAD) skills
Experience with formal testing methodologies (Test Plan and Procedure generation)
Strong ability to grasp new technologies and acquire new skills through independent study, professional training, and interaction with other team members
Mgr Computer Sys Security 3
External Job Description
Huntington Ingalls Industries (HII) is seeking an experienced cybersecurity professional to assist the HII Chief Information Security Officer in executing governance risk and compliance of HII's enterprise Cybersecurity Program. The candidate will assist in ensuring the implementation of controls and other processes and methods to protect the company's highly-distributed information systems.
This position reports to the Chief Information Security Officer, and performs the following duties:
1.Assists in managing the governance, risk and compliance of Supply Chain cybersecurity risk management.
2.Work with Division Procurement organizations to assess HII Supplier DoD regulatory compliance and assist Divisions in mitigating cybersecurity risk in the Supply Chain
3.Assists HII CISO with regard to data and information systems security risks, policies, actions, as well as applicable customer and regulatory requirements, including the DFAR. Areas of responsibility include risk analysis and risk management; threat assessment and management; and, incident response. Provides advice with regard to government notices and investigations related to information security.
4.Assist the security, regulatory controls and risk and vulnerability assessments of information security programs across the enterprise.
5.Work with HII CISO to provide consultation with division CIO to support the continuous planning, development and implementation of secure information systems infrastructure and policies, procedures and practices necessary to protect data and systems from internal and external threat.
6.Participate in and consult with Division Procurement teams and HII Supply Chain vendors to address cybersecurity issues related to DFARS 252.204.7012 and NIST 800-171 security requirements.
7.Assists in the development and implementation of hardening procedures for the enterprise's networks, hardware and software.
8.Maintains significant knowledge of information security technologies, networking and network architecture, as well as cyber threat actors, attack methodologies.
9.Assists in oversight to information security and privacy education programs.
BS in Computer Science or related field.
8 years of progressive experience in information security
Experience in the Defense Industrial Base/government contracting environment is essential.
Must have significant experience in cybersecurity governance risk and compliance, demonstrating substantial knowledge of information security technologies, networking and network architecture. Must have substantial knowledge of cyber threat actors and attack methodologies.
Must have strong communications skills – written, oral and presentational.
Master's degree in relevant field preferred.
3+ years of experience at a managerial or consultant level.
Current information security certifications as a CISSP, CISM, CIPP or CFE preferred. Multiple designations desired.
Computer Security Systems Specialist (Scap And Disa Stigs Management)
INTERFUZE was conceived and created to be a model for service excellence, both to customers and our staff. With a vision to be the partner of choice for government services, we have experienced rapid growth and expansion of our capability offerings. INTERFUZE is currently seeking well qualified candidates for a Computer Security Systems Specialist opening.
Specific duties include:
Design, develop, engineer, and implement solutions to MLS requirements.
Perform complex risk analyses which also include risk assessment.
Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
Support customers at the highest levels in the development and implementation of doctrine and policies.
Apply know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
Perform analysis, design, and development of security features for system architectures.
support all life cycle stages including development, staging, pre-production, production, training, migration and deactivation.
Support both hardware and software and shall include installation, configuration and documentation including STIG checklist, integration, load balancing, user account creation.
Management, log analysis, troubleshooting, incident response, repair, patching, upgrade, and optimization.
Analyzes the vulnerabilities and develops a remediation plan.
Troubleshoot and remediate any vulnerabilities identified by ACAS scans related to DISA STIG compliance.
Bachelor of Science in Business Administration, Business Analytics, Engineering (all), or Computer Science.
Candidates must meet eligibility requirements to obtain and maintain a Department of Defense (DoD) Secret security clearance, which mean US Citizenship is required. A current Secret level clearance is preferred.
Fields Are Required
What is your full name?
How can we contact you?
I agree to ApplicantPool's Applicant Information Use Policy.*
Apply for this PositionApply for this Position
- Sign Up For Job Alerts!
- Share This Page
Security Information And Education Coordinator
GENERAL SUMMARY: Under limited supervision, coordinates and supports the activities required to ensure a secure environment for patients, visitors and staff, in accordance with all applicable Security regulations governing the Environment of Care (EOC) and Emergency Preparedness Management Program. Responsible for the assigned activities required to meet compliance with the EOC sections, Joint Commission standards and all applicable Security standards. #The EOC sections include Security and Emergency Preparedness. # Education High School or Equivalency (GED) Experience 2-5 years teaching and/or training. Experience working in healthcare is preferred Skills Public speaking, giving presentations, teaching Proficient computer skills to include a working knowledge of Microsoft Ability to work independently with minimal supervision Ability to address various groups of people as the facilitator of meetings, education and training related to EOC Security and Emergency Preparedness Program Professional, clear and concise written and verbal communication skills Licensures, Certifications None Physical Requirements Stand or walk constantly (for up to an entire shift) on various surfaces (tile, concrete, carpet) Climb stairs, ramps, occasionally during shift Bend/twist at waist/knees/neck to perform various duties Reaching/handling/grasping/fingering while using phone, notepad, writing reports, and other administrative tasks Constant use of eyes (correctable vision to normal level required) to observe, read, interact with public and co-workers, view security monitors; includes hand/eye coordination Constant mental alertness and attention to detail required while setting priorities and following up on assignments Working Conditions Work in and around healthcare activities Conditions of Employment Normal annual competencies Standard Precautions Standard precaution policy and procedures are applicable to this job
GENERAL SUMMARY: Under limited supervision, coordinates and supports the activities required to ensure a secure environment for patients, visitors and staff, in accordance with all applicable Security regulations governing the Environment of Care (EOC) and Emergency Preparedness Management Program. Responsible for the assigned activities required to meet compliance with the EOC sections, Joint Commission standards and all applicable Security standards. The EOC sections include Security and Emergency Preparedness.
EducationHigh School or Equivalency (GED)Experience2-5 years teaching and/or training. Experience working in healthcare is preferred
Public speaking, giving presentations, teaching
Proficient computer skills to include a working knowledge of Microsoft
Ability to work independently with minimal supervision
Ability to address various groups of people as the facilitator of meetings, education and training related to EOC Security and Emergency Preparedness Program
Professional, clear and concise written and verbal communication skills
Licensures, CertificationsNonePhysical Requirements
Stand or walk constantly (for up to an entire shift) on various surfaces (tile, concrete, carpet)
Climb stairs, ramps, occasionally during shift
Bend/twist at waist/knees/neck to perform various duties
Reaching/handling/grasping/fingering while using phone, notepad, writing reports, and other administrative tasks
Constant use of eyes (correctable vision to normal level required) to observe, read, interact with public and co-workers, view security monitors; includes hand/eye coordination
Constant mental alertness and attention to detail required while setting priorities and following up on assignments
Working ConditionsWork in and around healthcare activities
Conditions of EmploymentNormal annual competencies
Standard PrecautionsStandard precaution policy and procedures are applicable to this job
Making better hires starts with building better job descriptions
- Browse 100s of templates across 40+ industries
- Customize your template with your company info & job requirements
- Post it to 20+ job boards in seconds – for FREE!